• My Account
  • Shop
  • Cart

Cyber Bunee

  • Home
  • News
    • artificial intelligence
    • cyber-security
    • hacking attacks
    • software dev
    • automation
    • certifications
    • Videos
      • Youtube Videos
    • Resources

    “Unmasking Hook: The Android Banking Trojan Born from ERMAC’s Legacy”

    New Analysis Reveals Android Banking Trojan ‘Hook’ Based On ‘ERMAC’

    • The Android banking Trojan called ‘Hook’ is discovered to be based on its precursor, ‘ERMAC’.
    • This revelation is a result of an analysis conducted by NCC Group’s Security Researchers.
    • All commands (totalling 30) that could be sent to an ERMAC-infected device can also control a device infected by Hook

    Hook – A Ghost Of ERMAC Past

    Security techies, don’t lose your ‘hooks’ just yet, but it appears that our Android banks are at risk. In a ‘How The Grinch Stole Christmas’ themed plot twist, researchers have discovered that the notorious Android banking trojan called ‘Hook’ is, in actuality, a derivative of our least favorite Christmas ghost – ‘ERMAC’. The connection between ERMAC and Hook is not just congenital, but more genetic, as the latter’s code is closely related to the former’s, almost like ERMAC passed on its mal-intended DNA!

    A Complex Family Tree For Simple Mayhem

    Unveiling the mysterious heritage of this malicious code, security researchers Joshua Kamp and Alberto Segura from NCC Group transparently laid out the complex lineage of the Hook malware. They concluded that ‘all 30 commands that a malware operator sends to an ERMAC-infected device can similarly control a Hooked device’. Now, this makes Hook an equally skilled puppeteer as ERMAC, but we’re not quite ‘hooked’ on that!

    Summary

    A recent study by NCC Group security researchers Joshua Kamp and Alberto Segura unveiled the grim reality of what we’ve been fearing: Hook, an Android Banking Trojan, has been proven to carry the grim legacy of its ancestor malware ERMAC. Apart from inheriting its not-so-enviable skillset, the Hook malware can also control the same set of commands as ERMAC does, like a ‘chip off the old block’. So, next time you’re dealing with Hook, remember – it’s an ‘apple’ that fell not so far from the ERMAC ‘tree’, only it’s got more worms!

    Now that we’re familiar with the family tree lineage of these malwares, we can metaphorically call ourselves malware genealogists, and that’s a title to hang your ‘Hooks’ on!



    Original Article: https://thehackernews.com/2023/09/hook-new-android-banking-trojan-that.html




    2023-09-18
    Facebook Twitter linkedin Pinterest WhatsAppt Telegram Email More
    Previous Article :

    “Unmasking the Flaw in MFA and PAM Security Systems Deployment: A Comprehensive Study”

    Next Article :

    “Major Microsoft Data Leak: Response, Repair and Lessons Learned”

    Similiar

    “Bracing for the Cyber Onslaught: Understanding the Surge in Dual Ransomware Attacks”

    “Bracing for the Cyber Onslaught: Understanding the Surge in Dual Ransomware Attacks”

    “Iran’s OilRig Strikes Again: Unpacking the Menorah Malware Menace”

    “Iran’s OilRig Strikes Again: Unpacking the Menorah Malware Menace”

    “Understanding Exim Security Vulnerabilities: An In-depth Look into CVE-2023-42114”

    “Understanding Exim Security Vulnerabilities: An In-depth Look into CVE-2023-42114”

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    See Also...

    “Bracing for the Cyber Onslaught: Understanding the Surge in Dual Ransomware Attacks”

    “Bracing for the Cyber Onslaught: Understanding the Surge in Dual Ransomware Attacks”

    Double Trouble: FBI Warns of Spike in Dual Ransomware Attacks Main Points The FBI has ...

    Latest News

    And We’re Back!…
    news

    And We’re Back!…

    bunee 04 Jun 2023

    Tech Reviews

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age
    tech review

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age

    bunee 20 Jun 2023
    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks
    tech review

    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks

    bunee 20 Jun 2023
    The Importance of Technology Training for Government Employees
    tech review

    The Importance of Technology Training for Government Employees

    bunee 20 Jun 2023
    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users
    tech review

    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users

    bunee 20 Jun 2023
    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”
    tech review

    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”

    bunee 20 Jun 2023
    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”
    tech review

    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”

    bunee 20 Jun 2023
    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller
    tech review

    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller

    bunee 20 Jun 2023
    • Home
    • News
      • artificial intelligence
      • cyber-security
      • hacking attacks
      • software dev
      • automation
      • certifications
    • Videos
      • Youtube Videos
    • Resources

    Follow Us

    Popular Videos

    Newsletter

    Popular News

    • 1

      And We’re Back!…

    • 2

      New Magecart Campaign: Multiple Cybercrime Groups Operating Simultaneously

    • 3

      Major UK Organizations Suffer Data Breaches: Boots, British Airways, and the BBC Among Those Affected

    • 4

      Verizon Report: Human Error a Top Cause of Cybersecurity Incidents in 2019

    • 5

      Tech Firm Mitigates Ransomware Attack: Tips for Protection

    Fellow Sponsors

    Tags

    attacks break into cyber coinbase crypto hacking how to ransomware updates
    (▀̿Ĺ̯▀̿ ̿) Copyright , All Rights Reserved
    Website courtesy of Lucid Perspective